Inspiration
MDR/MSSP analysts waste hours reverse‑engineering public exploits. We asked: What if CVE → mitigation took under 10 seconds?
What it does
Accepts a CVE/ExploitDB ID, returns a tactical brief with:
- Plain‑English exploit logic flow
- Stop‑gap mitigation (WAF/Snort rules)
- Confidence score for escalation decisions
No execution, no hallucinations.
How we built it
FastAPI + PostgreSQL (pgvector) + Ollama (Llama 3 8B) + Docker Compose.
Strict state machine ensures predictable behavior even with malformed LLM output.
I'm passionate about blue team and supply chain risks, and it has been made with coding agents.
Challenges we ran into
- LLM JSON reliability → Retry with format correction +
PARTIAL_SUCCESSfallback - Air‑gap ready → Zero cloud dependencies, local seed script
- Compliance → Async audit logging of every synthesis request
Accomplishments that we're proud of
✅ One‑sprint containerized MVP
✅ Resilient state machine (never crashes on bad LLM output)
✅ Full test coverage (unit + integration)
✅ Sub‑10s Time‑to‑Context on CPU
What we learned
- Prompt engineering is a contract—treat LLM output as a typed schema
- Async audit logging is non‑negotiable for dual‑use tools
- Ollama on CPU is viable for sub‑50KB prompts
What's next
- Web UI with real‑time streaming
- Full RAG via
pgvectorembeddings - SAML/OIDC for enterprise SSO
- Fine‑tuned security prompts
VulnSynth AI — From exploit to defense, in seconds.
Built With
- docker
- fastapi
- ollama
- pgvector
- postgresql
- python
Log in or sign up for Devpost to join the conversation.